Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Shiney Thomas"'
Publikováno v:
Emerging Technologies for Sustainability ISBN: 9780429353628
Emerging Technologies for Sustainability
Emerging Technologies for Sustainability
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b7e7e3904d95c7dd97200681234ee7a5
https://doi.org/10.1201/9780429353628-30
https://doi.org/10.1201/9780429353628-30
Autor:
Juby Mathew, Shiney Thomas
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 1085:012007
Image inpainting is a process that tries to fill in missing parts of a degraded image or remove objects from an image, but maintain the realistic content in the image. Various methods can be employed to perform inpainting. Here three benchmark method
Autor:
Shiney Thomas, Neethu Thomas
Publikováno v:
Procedia Technology. 24:1317-1324
Reversible data hiding is a technique that embeds additional information into some distortion-unacceptable cover media, such as military images, in a reversible manner so that the original cover image can be restored after extraction of the hidden in
Autor:
Mincy Shaji, Prem Chandra, Mohammad Okour, Ibrahim Alatoum, Shiny Shiju, Nirmala Sebastian, Noor Khial, Aseel Hatamleh, Dave Fernandez, Abdelqader Alsabou, Hussein Alomari, Nesiya Hassan, Fiona Milligan, Shiney Thomas, Emad Almomani
Publikováno v:
Journal of Emergency Medicine, Trauma and Acute Care. 2016
Background: There is little evidence of research outcome data or studies into self-reported back pain in Middle Eastern or Gulf region countries. Within HMC there is anecdotal evidence that suggests that back pain in nurses working in critical care e
Autor:
Neethu Thomas, Shiney Thomas
Publikováno v:
2015 Fifth International Conference on Advances in Computing and Communications (ICACC).
Reversible data hiding is a technique to embed additional message into some distortion-unacceptable cover media, such as military or medical images, in a reversible manner so that the original cover content can be perfectly restored after extraction
Publikováno v:
2013 International Conference on Control Communication and Computing (ICCC).
The concept of data hiding has made it possible to effectively transmit data in such a way that there is no compromise in security. Recent 3D steganographic techniques focus on maximizing the amount of data that can be embedded within the cover model
Autor:
Gloriya Mathew, Shiney Thomas
User authentication is one of the most important part of information security. Computer security most commonly depends on passwords to authenticate human users. Password authentication systems will be either been usable but not secure, or secure but
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::308e14aa48220fe51ca520d4c2356731
http://arxiv.org/abs/1311.4037
http://arxiv.org/abs/1311.4037
Publikováno v:
2012 7th International Conference on Computer Science & Education (ICCSE).
As E-Learning Systems are gaining more and more popularity; this paper proposes an adaptive E-Learning System based on semantic web technologies. Initially we calculate the users degree of interest towards different course topics based on SMS trigger